?
Solved

AIX Encryption using EFS

Posted on 2013-06-20
1
Medium Priority
?
1,536 Views
Last Modified: 2013-06-26
I was testing EFS on AIX 7.1. it was working when I decided to start over.
I deleted the filesystem and recreated the filesystem with the same name.
Now I get the following when entering root's EFS password:
efskeymgr -o ksh
root's EFS password:
Encryption framework returned an error: libefs bad parameter

I can change the password but still get the same error message.

Does anyone know how to fix this?

Also, once EFS is enabled with efsenable -a can it be disabled?

oslevel -s
7100-02-02-1316

lslpp -L | grep openssh
  openssh.base.client     6.0.0.6102    C     F    Open Secure Shell Commands
  openssh.base.server     6.0.0.6102    C     F    Open Secure Shell Server
  openssh.license         6.0.0.6102    C     F    Open Secure Shell License
  openssh.man.en_US       6.0.0.6102    C     F    Open Secure Shell
  openssh.msg.en_US       6.0.0.6102    C     F    Open Secure Shell Messages -

TIA,
Dan Kaib
0
Comment
Question by:scodhk
1 Comment
 
LVL 68

Accepted Solution

by:
woolmilkporc earned 1500 total points
ID: 39265238
Is your private key still valid?

efskeymgr -v

Maybe it could help regenerating the key

efskeymgr -R <algo>

e.g.

efskeymgr -R RSA_1024

And no, you can't revert the actions taken by efsenable (create admin/user/group keystores, create /var/efs, update /etc/security/user and /etc/security/group, update Config_Rules).

wmp
0

Featured Post

Take Control of Web Hosting For Your Clients

As a web developer or IT admin, successfully managing multiple client accounts can be challenging. In this webinar we will look at the tools provided by Media Temple and Plesk to make managing your clients’ hosting easier.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

OfficeMate Freezes on login or does not load after login credentials are input.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.
Suggested Courses

599 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question